If you went to or read about the Consumer Electronics Show that happened in Vegas earlier this month, you couldn’t help but be inundated with all the talk about tablets and smartphones. In fact, it was a tablet that won the coveted Best in Show award. I’ve got nothing against them and in fact I’m a user myself. The part that gets my goat is that there are a lot of “experts” greatly exaggerating the death of desktops and laptops at the hands of the smartphones and tablets. If I was a software developer and I took all these expert opinions to heart, I just might be inclined to scrap my d
While the scope of trusted computing may seem limited to an individual computer, one might also consider the broader context of public or private data centers and cloud computing.
So where does Intel fit into the picture?
Intel® Trusted Execution Technology (Intel® TXT) is Intel's flagship technology for making possible the implementation of the trusted computing vision described above. TXT, as a collection of technologies, is quite complex, but a summarizing list of features is as follows9:
The TPM, as defined by TCG, is a multi-function hardware unit solving a number of problems related to the context of trusted computing. In simplistic terms, the TPM can be thought of as a cryptographic co-processor with a secure integrity measurement storage scheme.
The problem of trust in computing platforms has been directly addressed by the Trusted Computing Group (TCG), an industry consortium formed in 2003 to create standards “with the aim of enhancing the security of the computing environment in disparate computer platforms.”
As network planners and security analysts consider implementing Intel® Active Management Technology into their environments, they can use the information in this document to gauge the native security of the platform and to understand some of the key security decisions associated with using the technology.